FIELD OF THE INVENTIONThe present invention relates generally to the transformation of target models in biometric applications when biometrics system components are updated or revised.
BACKGROUND OF THE INVENTIONA variety of real-world challenges arise in today's voice authentication technology accompanied by an increasing business demand for security in telephone applications. While most of the current challenges are directly or indirectly related to accuracy, robustness and computational efficiency, future field deployments with an ever growing number of biometric (in particular voice-enabled) user accounts will bring new sets of practical issues with them. The dynamically evolving area of biometric authentication, particularly speaker recognition, promises one such challenge: legacy issues in biometric (e.g. voiceprint, fingerprint, etc. model) maintenance. It is reasonable to expect that the average life span of a user account is likely to last longer than an innovation cycle of the underlying authentication technology. In other words, for a voice-enabled (or other biometric) account including the user's model representation, the particular implemented algorithm that created the model may change one or several times during the overall period of using the account.
Because the parametric structure of the user models is dictated by the underlying algorithms used to produce them, significant legacy issues (i.e., incompatibilities) can be introduced into existing large-scale databases of users. Consequently, algorithmic changes rendering existing accounts obsolete put in front of infrastructure providers new problems and decisions. For instance, assume that a service provider maintains several hundreds of thousands of voice-enabled accounts including users voiceprint models in their database. These models have a close relationship to data and algorithmic components inherent to the system. With a new generation of updated (improved) components, the provider is faced with the question of how to keep the existing accounts usable (i.e., voice-enabled). Among the few possibilities for addressing this problem are: 1) have users actively re-enroll into the new system, 2) automatically re-enroll users from a stored original waveform, 3) keep multiple system versions on line to support obsolete as well as new accounts, or 4) automatically convert obsolete models to the new configuration. Obviously, each solution builds on different assumptions (e.g. on the existence of an original waveform in case of voiceprints), has different consequences (e.g. increased complexity due to multiple system versions), and degrees of practicability (e.g. having users call to re-enroll, which may be unacceptable).
In view of the foregoing, a need has been recognized in connection with maintaining the functionality of users' accounts in the face of ever-changing components.
SUMMARY OF THE INVENTIONIn accordance with at least one presently preferred embodiment of the present invention, the solution no. (4) mentioned above, automatically converting an obsolete user model (based on a legacy system configuration) to a new model (compatible with the updated system) is addressed, while ensuring a minimum compromise in accuracy. Herein, this process is referred to as “model migration” and builds on the assumption that the obsolete model represents the only information available for the account (e.g., that no original waveform exists in case of voice authentication).
The primary quality criterion for any model migration technique is its performance in preserving system accuracy. The degree to which individual techniques will perform largely depends on the type of mismatch between the obsolete and the new technology, the background (system) data mismatch, as well as configuration mismatch. While it is desirable to have seamless migration independent of the modeling and features used, it is reasonable to focus first on the more common scenario involving a conversion between two GMM models of different size sharing common feature space. Generally, there is addressed herein the case of mismatched sizes between GMM models that are universal background models with differing data composition; these structures are referred to as substrates. It should thus be recognized that with a change in substrate, every user model (now obsolete) essentially needs to be migrated to a new substrate.
In summary, one aspect of the invention provides an apparatus for updating a biometric authentication arrangement, the apparatus comprising: an arrangement for accepting obsolete target models associated with at least one obsolete biometric authentication system substrate; an arrangement for transforming the obsolete target models into updated target models associated with at least one new or revised biometric authentication system substrate; the transforming arrangement being adapted to transform the obsolete target models into updated target models either: without the inclusion of additional data or additional waveform requirements; or with the inclusion of limited auxiliary data or limited auxiliary waveform requirements.
Another aspect of the invention provides a method for updating a biometric authentication arrangement, the method comprising the steps of: accepting obsolete target models associated with at least one obsolete biometric authentication system substrate; transforming the obsolete target models into updated target models associated with at least one new or revised biometric authentication system substrate; the transforming step comprising transforming the obsolete target models into updated target models either: without the inclusion of additional data or additional waveform requirements; or with the inclusion of limited auxiliary data or limited auxiliary waveform requirements.
Furthermore, an additional aspect of the invention provides a program storage device readable by machine, tangibly embodying a program of instructions executable by the machine to perform method steps for updating a biometric authentication arrangement, the method comprising the steps of: accepting obsolete target models associated with at least one obsolete biometric authentication system substrate; transforming the obsolete target models into updated target models associated with at least one new or revised biometric authentication system substrate; the transforming step comprising transforming the obsolete target models into updated target models either: without the inclusion of additional data or additional waveform requirements; or with the inclusion of limited auxiliary data or limited auxiliary waveform requirements.
For a better understanding of the present invention, together with other and further features and advantages thereof, reference is made to the following description, taken in conjunction with the accompanying drawings, and the scope of the invention will be pointed out in the appended claims.
BRIEF DESCRIPTION OF THE DRAWINGSFIG. 1 schematically illustrates the basics of a migration method in accordance with at least one preferred embodiment of the present invention.
FIG. 2 schematically illustrates some specifics of a model migration step from the method ofFIG. 1.
DESCRIPTION OF THE PREFERRED EMBODIMENTSHerebelow, numerals in brackets—[ ]—are keyed to the list of references found at the end of this section.
As an example, addressed herein is the task of speaker verification and user models having a GMM structure with mean parameters adapted via the Maximum A—Posteriori (MAP) method from a Universal Background Model (UBM) [4]. There is broadly contemplated herein a statistical method to migrate the user mean parameters from an obsolete model, M0that were adapted from an obsolete substrate, W0, of size N0Gaussians to a new user model M, consistent with a new substrate, W1, of size N1. It is assumed that both substrate UBMs are trained in a feature space identical up to a linear transform, but were composed from different data sets, and, in general, N0≠N1. Possibilities of overcoming the feature space assumption are outlined herebelow.
FIGS. 1 and 2 schematically illustrate the basics of a migration method in accordance with at least one preferred embodiment of the present invention. As shown inFIG. 1, anobsolete system substrate102 is configured to accommodateobsolete target models104. Theseobsolete models104 will thus likely be incompatible with a new/revisedsystem substrate108. Accordingly, in order to transform theobsolete models104 into updated (or migrated)target models106, amodel migration step110 is preferably employed. An algorithm forming part of such astep110 is discussed in detail herebelow.
FIG. 2 illustrates some specifics of amodel migration step110 in accordance with an embodiment of the present invention. As shown, any of three variant streams may be preferably employed in this step. In a first stream (a), there is solely a model component mapping step (B). In a second stream (b), there is a feature space mapping step (A) followed by a model component mapping step (B). Finally, in a third stream (c), there is a waveform synthesis step (C) that makes use of auxiliary information from both theobsolete target models104 and themigrated target models106. These different streams will also be better appreciated from the discussion herebelow.
The following one-iteration algorithm (in numbered steps1-4) can preferably implement, as part ofstep110, the MAP principle based on the means of the obsolete model and given the parameters of the new substrate. It exemplifies the model components mapping step (B).
1. Reconstruct the obsolete sample means {circumflex over (μ)}0iof the target speaker from the, adapted M0and W0for each Gaussian i. For the typical adaptation formula
this can be easily achieved knowing the global relevance factor r, the vector softcount ni(which is assumed available along with the obsolete model), and using the obsolete UBM mean m0i.
2. Calculate the set of posterior probabilities of Gaussian i of the new UBM accounting for the obsolete sample mean {circumflex over (μ)}j.
where π1idenotes the prior probability and P1i(•) the observation probability of Gaussian i of model W1.
3. Calculate new sample mean estimates on the new substrate:
Note that each component contribution is weighted by the original sample size nkattributed to each mixture component to reflect the natural proportionality of tile data. This is identical to multiplying by an obsolete prior probability π0kwhich, however, is typically not used in mean-only MAP adapted systems and is typically replaced by π1k.
4. Compute new (migrated) mean parameters via adaptation:
1<i<N, (4)
The above algorithm can be interpreted as one providing a new MAP estimate based on the new substrate model W1of a feature vector sequence comprised of the individual obsolete mean vectors in their original proportional representation. Further elaborating this idea, the described migration is identical to using the original training vector sequence, however, without its original causal ordering, quantized into N0different codebook vectors via the obsolete substrate model W0.
In the case of differences in feature spaces due to invertible linear transforms, such as the Maximum Likelihood Linear Transform (MLLT) [2], a straightforward transformation can be applied as follows
{circumflex over (μ)}=A1(A0)−1{circumflex over (μ)}′ (5)
with {circumflex over (μ)}′ the mean in the space of A0, and A1Al the transform into the space of W1.
Note that in computing the posteriors inStep 2, only the obsolete mean parameters are used. An alternative approach to further include the obsolete covariances into the softcount computation utilizes the symmetric KL divergence of two Gaussians defined as
This measure becomes 0 if μp=μqand Σp=Σq, as opposed to the quadratic term in the exponent of the Gaussian function,
which becomes 0already with μp=μq. Utilizing the KL divergence can prevent overemphasizing particular Gaussian pairs in γijdue to pure mean similarity. To obtain a proper scale one may preferably use (6) in an exponential form as follows:
γij=√{square root over (π1iπ0j)}exp(−DKL(p1i∥p0j))/Cj (7)
1≦i≦N1,1≦j≦N0
with C the normalizing term to satisfy Σiγij=1. The above form of γ is used in Step 2in place of (2).
Other distance measures, such as the Bhattacharyya distance may be used in place of the KL divergence (6).
The functional block of Feature Mapping (A inFIG. 2) can be implemented using various standard mapping or projection methods. Beyond invertible linear transforms, which can be solved via eq. (6), a possible but not sole approach would involve a the use of neural networks [10] to map one feature space into another trained using a held-out set of data and applied on the feature space of the obsolete system.
The functional block of Waveform Synthesis (C inFIG. 2) can be implemented using various algorithms for synthesis of speech signal waveforms from spectral representations, such as from cepstral features [7]. The synthesized waveform can then be used to re-enroll the target into the new system. Furthermore, the functional block C may also include partial synthesis, e.g. a synthesis of sequences of feature vectors, rather than the full waveforms, by using the set of obsolete model (and substrate) parameters. For example, in case of GMMs described above, a feature vector sequence can be generated as independent, identically distributed stochastic process with the mean and variance identical to a particular subset of Gaussian components of the obsolete model and be fed into the new system (assuming identical feature space).
By way of conclusion, statistical model migration is a viable way of converting models, that were rendered obsolete by system configuration changes, to new models compatible with a new system. It should be understood that the migration techniques discussed and contemplated herein are applicable in a wide range of environments. Thus, while voice authentication in telephony might represent one meaningful environment in which the migration techniques may be employed, they can also be applicable to a wide range of other biometric modeling systems such as fingerprinting, face recognition, hand geometry recognition and iris or retina scans, among many others.
REFERENCES[1] D. Reynolds, T. Quatieri, and R. Dunn, “Speaker verification using adapted gaussian mixture models,”Digital Signal Processing, Vol. 10, pp. 19-41, January/April/July 2000.
[2] U. Chaudhari, J. Navratil, and S. Maes, “Multi-grained modeling with pattern-specific maximum likelihood transformations for text-independent speaker recognition,”IEEE Trans. Speech and Audio Processing,2002.
[3] (URL) [http://www.]nist.gov/speech/tests/spk/index.htm.
[4] G. Ramaswamy, J. Navratil, U. Chaudhari, and R. Zilca, “The IBM system for the NIST 2002 cellular speaker verification evaluation,” inProc. of the International Conference on Acoustics, Speech, and Signal Processing(ICASSP), (Hong Kong), IEEE, April 2003.
[5] S. Maes, J. Navratil, and U. Chaudhari,E-Commerce, Agents, Marketplace—Solutions, Security Issues, and Supply Demand, ch. Conversational Speech Biometrics. LNAI 2033, Springer Verlag, 2001.
[6] U. Chaudhari, J. Navratil, C. Ramaswamy, and R. Zilca, “Future speaker recognition systems: Challenges and solutions,” inProc. Of AUTOID-2002, (Tarrytown, N.Y.), March 2002.
[7] D. Chazan, G. Cohen, R. Hoory, and M. Zibulski, “Speech reconstruction from mel-frequency cepstral co-efficients and pitch frequency,” inProc. Of the International Conference on Acoustics, Speech, and Signal Processing(ICASSP), June 2000.
[8] K. Fukunaga, “Statistical Pattern Recognition,” Academic Press, 2ndEd., 1990, ISBN 0-12-269851-7
[9] U.S. Pat. No. 6,529,871
[10] R. O. Duda et al., “Pattern Classification,” John Wiley & Sons, 2ndEd., 2001, ISBN 0-471-05669-3
It is to be understood that the present invention, in accordance with at least one presently preferred embodiment, includes an arrangement for accepting obsolete target models and an arrangement for transforming the obsolete target models into updated target models. Together, these elements may be implemented on at least one general-purpose computer running suitable software programs. These may also be implemented on at least one Integrated Circuit or part of at least one Integrated Circuit. Thus, it is to be understood that the invention may be implemented in hardware, software, or a combination of both.
If not otherwise stated herein, it is to be assumed that all patents, patent applications, patent publications and other publications (including web-based publications) mentioned and cited herein are hereby fully incorporated by reference herein as if set forth in their entirety herein.
Although illustrative embodiments of the present invention have been described herein with reference to the accompanying drawings, it is to be understood that the invention is not limited to those precise embodiments, and that various other changes and modifications may be affected therein by one skilled in the art without departing from the scope or spirit of the invention.
APPENDIX| TABLE 1 |
|
| DCF/EER results for migrated systems without T-Norm |
| Original | Target size (Number of Gaussians N1) | |
| 256 | 80.2/22.2 | 94.8/32.0 | 97.3/35.6 | 99.1/39.3 |
| 512 | 85.2/23.3 | 76.6/21.5 | 90.0/29.1 | 96.3/34.7 |
| 1024 | 79.6/20.5 | 81.2/22.8 | 64.9/18.7 | 87.7/29.7 |
| 2048 | 70.3/17.4 | 73.1/18.8 | 68.4/19.7 | 64.7/20.2 |
| Ideal Bsl | 46.6/11.4 | 42.6/10.8 | 39.9/10.1 | 37.1/9.4 |
|
| TABLE 2 |
|
| DCF/EER results for migrated systems with T-Norm |
| Original | Target size (Number of Gaussians N1) | |
| 256 | 49.0/13.5 | 61.7/16.3 | 74.2/19.8 | 85.6/23.0 |
| 512 | 50.1/13.8 | 45.2/12.2 | 58.0/15.7 | 75.8/20.4 |
| 1024 | 48.1/13.3 | 47.4/13.0 | 41.0/11.1 | 63.0/16.6 |
| 2048 | 46.4/12.3 | 46.1/12.4 | 44.6/12.0 | 47.2/12.4 |
| Ideal Bsl | 35.6/10.2 | 33.5/9.3 | 32.4/8.8 | 31.9/8.4 |
|
| TABLE 3 |
|
| DCF/EER results for migration based on |
| probabilities versus the KL divergence |
| Migration | 512 → 256 | 2048 → 256 |
| |
| Prob. (plain) | 85.2/23.3 | 70.3/17.4 |
| KL (plain) | 62.8/16.8 | 60.5/15.6 |
| Prob. (T-Norm) | 50.1/13.8 | 46.4/12.3 |
| KL (T-Norm) | 56.4/16.0 | 52.2/14.0 |
| |